{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T18:52:45Z","timestamp":1762714365707,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819525652","type":"print"},{"value":"9789819525669","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2566-9_38","type":"book-chapter","created":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T18:47:51Z","timestamp":1762714071000},"page":"567-586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Data Hiding Algorithm in Encrypted Images Based on Arithmetic Coding and Dual Prediction"],"prefix":"10.1007","author":[{"given":"Mengyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinyi","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Tonghui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wanli","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"114361","DOI":"10.1016\/j.chaos.2023.114361","volume":"178","author":"M SaberiKamarposhti","year":"2024","unstructured":"SaberiKamarposhti, M., Ghorbani, A., Yadollahi, M.: A comprehensive survey on image encryption: taxonomy, challenges, and future directions. Chaos Solitons Fractals 178, 114361 (2024)","journal-title":"Chaos Solitons Fractals"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Bender, W., Butera, W., Gruhl, D., et al.: Applications for data hiding. IBM Syst. J. 39(3.4), 547\u2013568 (2000)","DOI":"10.1147\/sj.393.0547"},{"key":"38_CR3","doi-asserted-by":"publisher","first-page":"116523","DOI":"10.1016\/j.image.2021.116523","volume":"100","author":"O Evsutin","year":"2022","unstructured":"Evsutin, O., Dzhanashia, K.: Watermarking schemes for digital images: robustness overview. Signal Process. Image Commun. 100, 116523 (2022)","journal-title":"Signal Process. Image Commun."},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1016\/j.ins.2022.07.120","volume":"609","author":"PC Mandal","year":"2022","unstructured":"Mandal, P.C., Mukherjee, I., Paul, G., et al.: Digital image steganography: a literature survey. Inf. Sci. 609, 1451\u20131488 (2022)","journal-title":"Inf. Sci."},{"key":"38_CR5","unstructured":"Kumar, S., Gupta, A., Walia, G.S.: Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges. Appl. Intell. 1\u201334 (2022)"},{"key":"38_CR6","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TMM.2020.2999187","volume":"23","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Cai, Z., He, W.: High capacity reversible data hiding in encrypted image based on intrablock lossless compression. IEEE Trans. Multimedia 23, 1466\u20131473 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Khudhair, S.K., Sahu, M., KR, R., Sahu, A.K.: Secure reversible data hiding using blockwise histogram shifting. Electronics 12(5), 1222 (2023)","DOI":"10.3390\/electronics12051222"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"107888","DOI":"10.1016\/j.sigpro.2020.107888","volume":"180","author":"G Fan","year":"2021","unstructured":"Fan, G., Pan, Z., Gao, E., et al.: Reversible data hiding method based on combining IPVO with bias-added rhombus predictor by multipredictor mechanism. Signal Process. 180, 107888 (2021)","journal-title":"Signal Process."},{"issue":"3","key":"38_CR9","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Signal Process. 94, 118\u2013127 (2014)","journal-title":"Signal Process."},{"issue":"4","key":"38_CR11","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2019","unstructured":"Yin, Z., Xiang, Y., Zhang, X.: Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans. Multimedia 22(4), 874\u2013884 (2019)","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"38_CR12","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1109\/83.855427","volume":"9","author":"MJ Weinberger","year":"2000","unstructured":"Weinberger, M.J., Seroussi, G., Sapiro, G.: The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans. Image Process. 9(8), 1309\u20131324 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"38_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","volume":"21","author":"S Yi","year":"2018","unstructured":"Yi, S., Zhou, Y.: Separable and reversible data hiding in encrypted images using parametric binary tree labelling. IEEE Trans. Multimedia 21(1), 51\u201364 (2018)","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"38_CR14","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","volume":"22","author":"Y Wu","year":"2019","unstructured":"Wu, Y., Xiang, Y., Guo, Y., et al.: An improved reversible data hiding in encrypted images using parametric binary tree labelling. IEEE Trans. Multimedia 22(8), 1929\u20131938 (2019)","journal-title":"IEEE Trans. Multimedia"},{"key":"38_CR15","unstructured":"Ma, W., Wu, Y., Yin, Z.: High-capacity reversible data hiding in encrypted images using adaptive encoding. arXiv preprint arXiv:2102.12620 (2021)"},{"issue":"4","key":"38_CR16","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"38_CR17","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"38_CR18","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670\u20131681 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"38_CR19","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/TMM.2021.3062699","volume":"24","author":"Y Wang","year":"2021","unstructured":"Wang, Y., He, W.: High capacity reversible data hiding in encrypted image based on adaptive MSB prediction. IEEE Trans. Multimedia 24, 1288\u20131298 (2021)","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"38_CR20","first-page":"571","volume":"40","author":"K Qi","year":"2023","unstructured":"Qi, K., Zhang, M., Ke, Y., et al.: High capacity reversible data hiding algorithm in encrypted image based on adaptive MSB and difference prediction. Appl. Res. Comput. 40(2), 571\u2013576 (2023)","journal-title":"Appl. Res. Comput."},{"issue":"2","key":"38_CR21","first-page":"272","volume":"41","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Li, F., Qin, C.: Reversible information hiding algorithm in ciphertext domain with multiple embedding based on block classification. J. Appl. Sci. 41(2), 272\u2013283 (2023)","journal-title":"J. Appl. Sci."},{"issue":"4","key":"38_CR22","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"38_CR23","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"X Wu","year":"2014","unstructured":"Wu, X., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104, 387\u2013400 (2014)","journal-title":"Signal Process."}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2566-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T18:47:52Z","timestamp":1762714072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2566-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"ISBN":["9789819525652","9789819525669"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2566-9_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"10 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hiroshima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.icpcsee.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}